[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] How to write remote exploits ( V. 1.1)
- To: Sumy <sanandres@xxxxxxxxx>
- Subject: Re: [Full-disclosure] How to write remote exploits ( V. 1.1)
- From: emilio@xxxxxxxxxxx
- Date: Mon, 4 Apr 2005 09:29:34 -0300 (BRST)
Damn man. This html is horrible.
First: The code table is messing up the horizontal scroll.
Second: There are smiles eating part of the code!!
________________________________________________________
O mundo pode ser irreverente e criativo, mas o tempo eh
conservador.
On Sat, 2 Apr 2005, Sumy wrote:
How to write remote exploits ( V. 1.1)
1. Introduction
Hi welcome to my first english tutorial, and my first tutorial about
exploit coding, on the next pages, I want to show you the basics of
remote exploits writing. In order to understand the following, I hope
that you know "socket programming in C", also ANSI C, and I hope you
know how local exploits work. If you haven't got any idea of these
things I want to suggest you to first read other papers or books
like?:
o The C Programming language (Kernighan/Ritchie)
o Unix Network Programming (Richard Stevens)
Full Article: http://www.exploitx.com/forum/azbb.php?1112286936
More Articles: http://www.exploitx.com/forum/azbb.php?Tutorials_and_Articles
--
http://www.outwartips.net
http://www.exploitx.com
Please make a donation clicking on Our ads.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/